
anyfun
44 posts

anyfun retweetledi

[ZDI-25-1039|CVE-2025-12686] (Pwn2Own) Synology BeeStation Plus auth_info Stack-based Buffer Overflow Remote Code Execution Vulnerability (CVSS 9.8; Credit: @Tek_7987 and @_Anyfun (both working @Synacktiv)) zerodayinitiative.com/advisories/ZDI…
English
anyfun retweetledi

At #Pwn2Own2025, our experts @Tek_7987 & @_Anyfun remotely compromised a Synology Beestation Plus via a pre-auth exploit, leading to full system takeover.
The vuln is now tracked as CVE-2025-12686 🔍
🔗 Full write-up: synacktiv.com/en/publication…
English
anyfun retweetledi

A big shout-out to the @Synacktiv team for their strong performance at the latest #Pwn2Own competition in Cork!
They proudly secured third place overall 👏
Next stop: Tokyo for the upcoming edition 🇯🇵 👀
More details on the targets and participants here ℹ️
zerodayinitiative.com/blog/2025/20/p…

English
anyfun retweetledi

Congrats to @Tek_7987 and @_Anyfun for landing the first successful entry at #Pwn2OwnCork - exploiting a stack overflow on @Synology BeeStation Plus for $40,000 and 4 Master of Pwn points in the process 💥
Let’s keep pushing 💪
#P2OIreland #Synacktiv

English

Let’s go!
TrendAI Zero Day Initiative@thezdi
The schedule for #Pwn2Own Ireland is now live! 53 entries from 25 teams over three days of excitement and pwnage. We'll be updating the schedule with live streaming information as we get them set up. zerodayinitiative.com/blog/2025/20/p… #P2OIreland
English
anyfun retweetledi

Userland iOS aficionados, I released a simple IDA plugin that should improve your Objective-C experience.
For now it removes ARC function calls in decompiled code (eg objc_retain) and helps listing candidate callers to a method. Check it out at github.com/synacktiv/objc…
Synacktiv@Synacktiv
The "Objective-C helper" IDA plugin presented during the @sth4ck talk "Demystifying Objective-C internals" given by @v1csec is now publicly available on GitHub at github.com/synacktiv/objc… The slides are also available on our website: synacktiv.com/sites/default/…
English
anyfun retweetledi

Gunshots pierce the night as a Tesla speeds away... lead the hunt for a covert criminal group in this year's @sstic challenge! We worked hard to design unique and thrilling puzzles. Join the chase starting today 16:00 GMT+1 at sstic.org/2024/challenge/ !
English
anyfun retweetledi

Take the time to read our new #PluginFocus article. In this blog post, Arnaud Gatignol (@_anyfun) and Julien Staszewski (@_0perator) from the @thalium_team introduce ida kmdf, a tool that helps with your KMDF driver analysis. Read more 🌐 hex-rays.com/blog/plugin-fo…
#idapro

English

Just leaving Toronto and pwn2own! What a blast we've had with Maxime T.
Very good collective work @thalium_team
x.com/thalium_team/s…
Thalium Team@thalium_team
Proud of our #teamThales who were able to execute their exploit on the QNAP TS-464; We were delighted to participate to #PWN2OWN and hope to return next year for a new challenge!✅
English

En raison de la situation actuelle en Israël, on a quelques tickets pour @hexacon_fr en rab et @Cellebrite serait heureux de vous les offrir. Pour participer, il suffit de répondre à ce message et on sélectionnera des gagnants demain (12 octobre) dans l'après midi.
Français
anyfun retweetledi
anyfun retweetledi

As a treat before next week's talk at OffensiveCon by Guillaume & Quentin, here is an introduction to our recent findings on KSMBD. Enjoy, and see you in Berlin to all #OffensiveCon23 attendees!
@offensive_con
blog.thalium.re/posts/ksmbd-tr…
English
anyfun retweetledi

🛰️@esa has organised an unprecedented takeover of a demonstration satellite.
The @thalesgroup's offensive #cybersecurity team took up the challenge by identifying vulnerabilities that could disrupt the operation of #ESA's satellite.
#CYSAT
thls.co/1phS50NRa21

English
anyfun retweetledi

Abusing Linux In-Kernel SMB Server to Gain Kernel Remote Code Execution by @guteissier and @laomaiweng offensivecon.org/speakers/2023/…

English

The #HEXACON2023 team gave its best shot for this year's venue!
Will you be able to find the location? 🇫🇷🏛️🚇

English
anyfun retweetledi
anyfun retweetledi



